General
-
Target
845fb0b6f4b9950b5d74fcaebb882256_JaffaCakes118
-
Size
7.9MB
-
Sample
241101-mcbmcaxrez
-
MD5
845fb0b6f4b9950b5d74fcaebb882256
-
SHA1
5ba628998e75d7ff162767cfb511b67878192a45
-
SHA256
e21bdff3127642917f48f774beeaeed37046d029d20ea7005f5e33889e8e7188
-
SHA512
29589308ea81cb7bf7b65c46d40106b7c36ad4c453ef83bba2422589b7de3114e2de72d1aa651febc1eb563969c49eb3f28b95cd21d2a2abc3e95c006472e6a5
-
SSDEEP
196608:mY3oHgUuCSP85ImS6ve8/UwAZyXAJuoDRUS4qq376lxe:mY4AUA05ImtvecUDZyXquolf4q46l8
Static task
static1
Behavioral task
behavioral1
Sample
845fb0b6f4b9950b5d74fcaebb882256_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
845fb0b6f4b9950b5d74fcaebb882256_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
845fb0b6f4b9950b5d74fcaebb882256_JaffaCakes118
-
Size
7.9MB
-
MD5
845fb0b6f4b9950b5d74fcaebb882256
-
SHA1
5ba628998e75d7ff162767cfb511b67878192a45
-
SHA256
e21bdff3127642917f48f774beeaeed37046d029d20ea7005f5e33889e8e7188
-
SHA512
29589308ea81cb7bf7b65c46d40106b7c36ad4c453ef83bba2422589b7de3114e2de72d1aa651febc1eb563969c49eb3f28b95cd21d2a2abc3e95c006472e6a5
-
SSDEEP
196608:mY3oHgUuCSP85ImS6ve8/UwAZyXAJuoDRUS4qq376lxe:mY4AUA05ImtvecUDZyXquolf4q46l8
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-